| Name | CVE-2014-3570 |
| Description | The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-132-1, DSA-3125-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| openssl (PTS) | bullseye | 1.1.1w-0+deb11u1 | fixed |
| bullseye (security) | 1.1.1w-0+deb11u4 | fixed | |
| bookworm | 3.0.17-1~deb12u2 | fixed | |
| bookworm (security) | 3.0.17-1~deb12u3 | fixed | |
| trixie | 3.5.1-1 | fixed | |
| trixie (security) | 3.5.1-1+deb13u1 | fixed | |
| forky, sid | 3.5.4-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| openssl | source | squeeze | 0.9.8o-4squeeze19 | DLA-132-1 | ||
| openssl | source | wheezy | 1.0.1e-2+deb7u14 | DSA-3125-1 | ||
| openssl | source | (unstable) | 1.0.1k-1 |
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=a7a44ba55cb4f884c6bc9ceac90072dea38e66d